Pennsylvania’s new Clean Slate Law and what this means for data privacy

Because of a law passed last year, the Clean Slate Law, millions of Pennsylvania residents’ old and nonviolent criminal records are beginning to be automatically sealed, causing the data to be wiped from public view. Read More »

Product Highlight: Age & Identity Verification

Age and Identity Verification with Martin Data

After many requests and much industry demand, Martin Data has a new product joining the lineup. We’re pleased to announce ID Verification via API!

This product is ideal for businesses who are interested in making sure that their customers are who they say they are (“know your customer” situations) as well as those looking to verify the age of their customers.

This simple API call works in a very intuitive way. You send us all of the information you have on the individual (Name, Address, SSN, DOB, Phone, Drivers License, or whatever else you have) and we do all the work! We’ll search our databases for any close-matched individuals and then give you a score associated with each of them.

Read More »

EasySwitch XML – an interview with our CTO

Word around the office is that we have added a new feature to our API platform. Not being a real techie, I decided to quiz our CTO, AJ Holloway, about this new feature. Here’s what I learned!

Jason Wiseman: Ok, so everyone’s talking about this new “EasySwitch XML” – what can you tell me about it?

AJ Holloway: Of course! Our EasySwitch XML platform allows our customers to dictate an XML format in which they’d like to receive their data instead of us prescribing one which their development team will have to re-code for.

Jason: I’m sorry, what? I honestly have no idea what any of that means. I don’t even know what XML is. Let’s back up a bit here…

AJ: Haha, my apologies! The basic idea of an “API” is that it allows our customers to plug our data directly into their products. Our gasoline in their engines, if you will. “XML” is just the format that we deliver it to our customers in. In any normal situation, our customers will program their products and tools to request data from our system. Our system will then send back the results and their system can use the data as if it was in-house. Does that make sense?

Read More »

Security! How do potential clients get credentialed?

With the ever-present threat of data insecurity in our modern world, it is incumbent upon those with the access to sensitive records to only share it with those that can be trusted with it.
USInfoSearch has a number of strict requirements to ensure the suitability of a potential client. Here’s what we check for before we cross the T’s and dot the I’s on any contract.

Read More »